January 2016

swiding's picture

A new era of secure connected identities will fuel innovation in how we work, shop and play.

Last week, I discussed the industry’s increased focus on streamlining security to enhance the overall user experience.  This can only be accomplished by ensuring that security is a “given,” where people can easily and confidently go about their daily lives. 

And, after two decades of advances from simple visual ID badges and smart cards to mobile ID solutions, the industry will now enter its next new chapter that will serve as the “tipping” point for these frictionless user experiences:  connected identities that are used on a variety of devices for a growing range of existing and new applications. 

  • There will be greater reliance on many digital versions of our identity, used in many different ways across all walks of life. 
  • We will connect our identities to an expanding solution ecosystem for secure access to doors, data and cloud-based services and applications, accelerating the need for unified identity management systems and processes.
  • The more we use these connected identities to secure so many aspects of our lives, the more it will fuel innovation in everything from the way we bank and purchase items to how our businesses, hospitals, schools, manufacturing plants and other facilities are built and operated. This will also create new business models and monetization opportunities.
  • Multi-layered security strategies will be critical for protecting these connected identities.
  • Biometrics will offer the potential to eliminate digital identity theft while making security even more convenient.  This is the only form of authentication that binds digital identities to the individual, determining who is actually using the system while verifying whether he or she is the true, legitimate identity owner for a myriad of new mobile and on-line applications.

Connected identities for a more connected world will also be catalyzed by advances in privacy and trust for applications in the Internet of Things, not to mention best practices for deploying simple yet secure solutions.  Check back next week to learn more.

swiding's picture


Security will move to a much greater focus on the user experience.

When it comes to security, I see the industry rapidly moving from security-driven to a very experience-driven conversation. Today’s question is, "How do we make it easier for people to go about their daily lives…and how do we make that happen?”   Customers are increasingly  seeking a comprehensive secure identity experience for their users, but with a stronger focus than ever on making security a “given.”

Why?  Users will continue to be the most important elements and yet weakest links in any security strategy, putting themselves and the people they work and transact with at risk when they don’t do their part.  Advancements in the security experience will play a vital role in closing this gap between security planning and user compliance. 

Some of the developments we see in this area include:

  • Security technology will no longer define office habits and personal lifestyles but adapt to them while empowering new capabilities, making it easier – and even attractive – for users to comply with requirements.
  • Users will have more options for presenting secure identities for authentication.  Organizations are now interested having the choice to use any combination of ID cards, phones or other mobile device, or biometric factor such as a fingerprint.  The coming years will bring even more options.
  • Traditional authentication elements like passwords, challenge/response questions and logon tokens will disappear, to be replaced by better ways of securing mobile banking channels, authenticating to corporate data, apps and web services, and accessing healthcare and other sensitive personal information. 

Streamlining security is a top agenda item in the industry, and our job at HID Global is to ensure it is seamless, frictionless and easy to navigate.  This lays the foundation for organizations to introduce more flexible, adaptable solutions that improve the overall user experience and compliance. 
 

Watch the video for more, and stay tuned for HID Global’s perspective on connected identities, the Internet of Things and security policies for 2016.

mrobinton's picture

The use of Near Field Communications (NFC) technology is heating up with the popularity of mobile payments and other applications, which begs the question, “What else could I do with NFC-enabled phones?” After attending many NFC and RFID conferences this year, I can certainly say that there are a lot of cool new use cases for NFC that are helping businesses and other organizations tackle the complexities of workflows and  securing sensitive transactions. And, with Internet of Things (IoT) quickly becoming top-of-mind for organizations, solutions that secure NFC applications are at the heart of making this a reality.

One set of use cases could be broadly categorized as “proof of presence.”   Proof of presence refers to the ability to verify that an individual is where they say they are.  This is made possible by using unclonable NFC tags with a cloud authentication service to digitally prove the presence of someone in order to improve auditing and prevent fraud in the growing service economy. Some examples include:

  • Electronic Visit Verification (EVV)

    With rampant fraud in the home healthcare space, government mandates and private payers are requiring the implementation of EVV. Using an NFC-based EVV solution, secure NFC tags are placed in patients homes for verification and proof of presence. The caregiver taps on the tag at the beginning and end of their visit to prove they were physically present and to document the visit for accurate billing. Check out our white paper for more information.
     

  • Security Guard Tours

    Leveraging an NFC mobile phone a guard is already carrying, secure NFC tags are placed throughout buildings and campuses for the guards to tap with their phone.  This digitally documents each location as he or she makes their rounds.  All of the data is centralized via a cloud-based system for reporting and analysis to help keep the building secure.
     

  • Time and Attendance

    Utilizing a mobile phone/ tablet or USB reader on a PC, cloud-based time and attendance systems can be quickly set up anywhere to validate someone’s presence with the tap of their badge.

Asset management is another area NFC is being used. Tagging assets with a variety of unique NFC form factors makes it possible to digitally and automatically track users checking in and out assets, such as sporting equipment, bike rentals, keys for realtors, and other borrowed items.

The final area where NFC is seeing some popularity is in consumer interactions.  With hundreds of millions of NFC phones in the hands of consumers, mobile phones provide a secure and convenient way for brands to interact with their customers. For example, manufacturers are adding secure NFC tags to items, ranging from alcohol to pharmaceuticals, to ensure authenticity against clones for brand protection.  Companies also use NFC tags to protect supply chain diversion (grey market) and warranty fraud.

Digital marketing is another example of using NFC tags for consumer engagement.   The use of standard NFC stickers has been growing in popularity in outdoor ads at bus stops and inside retail locations. Now, those ads are used for more than just raw information. Brands are using secure NFC tags to incorporate interactive campaigns like sweepstakes contests and customer loyalty reward programs. Implementing NFC technology into marketing programs, marketers can react in real time to campaign success or adjust efforts based on measurable data.  

With all of these new applications hitting the market, I expect 2016 will be a busy year for Internet of Things applications and NFC, where there will be wider adoption across different markets and continued technology innovation in the industry.  Stay tuned as HID Global continues to work with our partners to develop new and existing use cases.

swiding's picture

Mobilizing Security for a Better User Experience

HID Global is watching five key developing trends that will shape the secure identity landscape in the new year.  One of the top developments we are seeing is the move to “mobilizing” security, which will make it more pervasive and personalized.

As we do more with our phones and increasingly demand anywhere/anytime on-line access, there is the opportunity to better protect these activities while creating a more satisfying, mobile-centric security experience at home, in the office, on the road and on-line. 

Over the past several years we’ve begun to turn phones into ID cards, keys and computer logon tokens while plugging security holes that mobility initially introduced. Moving forward, continuing advancements will enable a new, more secure identity lifestyle built around the convenience and ubiquity of our ever-present mobile devices:

  • Improvements in deployment, onboarding, management and professional service options will help accelerate mobile access adoption, increasing user confidence and capabilities across a growing range of applications. 
  • It will become even easier for travelers to open hotel doors, for college students to enter dorm rooms, and for on-line bank customers to transact with their phones. 
  • Computer and network logon will move even more seamlessly to phones, tablets and laptops. 
  • Visiting healthcare workers, patrolling guards, field inspection teams and factory workers will touch their phones to RFID tags to log their presence and securely monitor processes in the Internet of Things (IoT). 
  • Wearables and other mobile products will join the device ecosystem, giving users even more choices and flexibility.
  • Putting secure identities on smartphones will also have the potential to radically change citizen ID systems.  Mobile devices can act as readers and eliminate expensive infrastructure, while paving the way for numerous new national ID applications beyond simple visual identification.

Watch the video for more information and stay tuned for a deeper dive into other key trends focused on the changing secure identity experience, privacy and security best practices, as well as interconnected digital identities and the Internet of Things (IoT).